You've requested...

Share this with your colleagues:

Intended and Unintended Consequences of Innovation

If a new window did not open, click here to view this asset.

Download this next:

CW Special report on Symantec

 

Since it was formed in 1982, Symantec has become renowned for its security and data management products and its antivirus expertise. ‘Big Yellow’, as the company is known after its distinctive logo, is living proof that security is big business, having grown steadily in the internet boom to become the world’s largest security and data management supplier.

 

The company employs 22,500 people worldwide and had revenues of $6.73bn for its full fiscal year 2012, up 9% on 2011. This makes Symantec roughly a tenth of the size of Microsoft in terms of revenue, and a quarter of the size by head count.

 

Packed with graphs and diagrams and tables, this independent analysis by Computer Weekly  is essential reading for any organisation working with, or thinking of working with Symantec.



Click on the button below to download this article

 

 

 

These are also closely related to: "Intended and Unintended Consequences of Innovation"

  • IT Security Case Studies

     

    Winning security use cases in the Computer Weekly European Awards

     

    Warwick Ashford presents 4  IT security case studies selected from the winners of Computer Weekly’s European User Awards.

     

    Contents:

     

    • How Bromium helped US supermarket chain solve security challenge virtually
    • How the IASME information assurance certification gives SMEs the edge
    • How Solihull council saves time and money with bring your own device programme
    • How Symantec helped an NHS trust cut security costs by a quarter

     

     

     

    The Computer Weekly European User Awards honours IT professionals across Europe that have excelled in their approach to using technology in Networking, Security, Software, Storage and Datacentres.         

  • CW ANZ: Cyber security plan bears fruit

    Australia’s Cyber Security Strategy, aimed at protecting citizens, companies and critical infrastructure, has made significant headway over the past year, but the jury is still out on its long-term impact. In this month’s CW ANZ, we take a look at the progress of Australia’s national cyber security blueprint and what else needs to be done to better protect Australia’s interests in the global cyber security landscape.

     

    Also in this issue:

    Australian government bolsters IT security in A$10.6m budget boost: The country’s Digital Transformation Agency has been given a shot in the arm to guard public sector IT systems against cyber attacks

    Penetration testing essential for success in security arms race: Demand for security testing, which should be conducted from the onset rather than as an afterthought, is growing in Australia.

    Take an educated approach to threat intelligence: With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever.

Find more content like what you just read:

  • Integrated backup vs. traditional disk libraries

    Disk is still rising to dominance in IT storage, but it's adapting to the increasing preference toward all-in-one and integrated backup appliances. Check out this SearchStorage.com E-Guide to explore these new options.

    Download

  • E-Guide: New Malware Threats Require New Antimalware Protection Strategy

    This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.

    Download

  • Expert guide: Reconfigure your anti-malware strategy to combat new cyber-threats

    This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.

    Download

  • CW Buyer's Guide to Apple in the Enterprise

    This nine-page buyer's guide assesses the growth of Apple's computers and iPads in business and the enterprise.

    Download

  • The Evolution of Threat Detection and Management

    This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.

    Download

  • CW ANZ: On cyber alert

    In this month's CW ANZ, read about the state of cyber security in Australia, Telstra's efforts to help enterprises improve their cyber security posture, and how Australian organisations can keep up with the demands of cyber security.

    Download

  • CW ASEAN: Be alert to threats

    With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy.

    Download

  • Proactive security measures: How to prevent malware attacks

    Read this expert E-guide to find out what new malware threats can mean for your business. Learn how to stop the malware inside your network and other key tips to evolving your security in order to combat dangerous new forms of malware by consulting this resource.

    Download

  • Robust cyber resilience for financial institutions’ most critical data

    Check out this data sheet to discover how the Dell PowerProtect Cyber Recovery solution is being used to comply with the Sheltered Harbor Specifications and see an overview of the data vaulting process.

    Download

  • Zero-trust: Securing remote access to cloud applications

    Zero-trust access is an emerging practice that has arisen to address the need to enable secure remote access to applications for employees, partners, and other third parties, regardless of where the application resides. This white paper takes an in-depth look at the approaches to zero-trust and the benefits of each. Read on to learn more.

    Download

  • CW ASEAN - September 2017: Strike a business balance

    In this month's issue of CW ASEAN, we delve deeper into the motivations for adopting cloud-ERP systems in ASEAN, and what enterprises need to consider before jumping onto the bandwagon. Also, find out what Dell-EMC is doing to tackle the Asia-Pacific market, and how NTT Docomo is using SAP Hana to improve customer service.

    Download

  • 12 EDR providers and how they stack up

    As the enterprise detection and response (EDR) space continues to evolve, security analytics will dictate which providers will lead the pack. In this Forrester Wave, find 12 different EDR providers that matter the most and how they stack up.

    Download

  • 12 EDR providers and how they stack up

    As the enterprise detection and response (EDR) space continues to evolve, security analytics will dictate which providers will lead the pack. In this Forrester Wave, find 12 different EDR providers that matter the most and how they stack up.

    Download

  • An essential guide to cloud storage

    Cloud backup and disaster recovery services have matured and are now viable alternatives for enterprise data protection environments. Hybrid approaches can effectively integrate on-premises systems with cloud storage services.

    Download

  • Evaluating the features and capabilities of top endpoint security services

    Networks are expanding to include remote devices that exist outside of the traditional perimeter, and organizations require modern endpoint security services. In this white paper, uncover the results from Info-Tech’s Data Quadrant Report on endpoint security to ensure your organization is equipped to make an informed buying decision.

    Download

  • DNS-layer protection & web gateway security: Comparing top vendors

    In 2019, AV-TEST, an independent IT security institute, was commissioned by Cisco to conduct a study comparing Cisco cloud security with similar industry-leading solutions to determine the malware protection and phishing block capabilities of all vendors. Read on to uncover the results.

    Download

  • CW Middle East July to Sept 2017

    In this issue of CW Middle East, we find out why the Gulf region must do more to attract women into IT if the region’s countries are to diversify.

    Download

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

    Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.

    Download

  • MDM features vs. native mobile security

    When it comes to mobile security, how can you ensure your device is secure? While mobile devices already have native security measures embedded, there are also mobile device management (MDM) products available. Which is the better approach? In this e-guide, expert Lisa Phifer takes a look at the pros and cons of each.

    Download

  • Security predictions for the rest of 2020

    Download Cybereason's 2020 Security Predictions: Nation States vs. Market Innovation for predictions on the landscape today, the adversaries of 2020, the defenders of 2020, and the hope for 2020 and beyond.

    Download

  • Forcepoint vs. McAfee vs. the rest: 2020 data protection vendors, compared

    Choosing a new data protection partner—or replacing an existing one—is a significant decision. That’s why Forcepoint created this guide to take the guesswork out of evaluating different enterprise solutions and help you choose with confidence. In the guide, find 11 points to keep top-of-mind while you evaluate different solutions.

    Download

  • CW APAC buyer's guide to cloud security

    In this buyer's guide, Computer Weekly offers advice on making cloud security choices, looks at how to guard against DDoS attacks, and finds out Amazon's approach to building secure cloud products.

    Download

  • Cloud security buyer's guide: What to look for in a solution

    In this Cloud Security Buyer’s Guide, find 13 points to keep top-of-mind while evaluating solutions and determining the best fit for your organization.

    Download

  • IT in Europe - May 2012

    While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.

    Download

  • Worldwide hybrid cloud workload security market shares

    This IDC study presents the worldwide hybrid cloud workload security market shares for 2019 (updated in June 2020.) Download the report to uncover the leaders and those who own the rest of the market.

    Download

  • CW ASEAN November 2016

    Small businesses in the ASEAN region could unknowingly be allowing hackers to access large corporate networks.

    Download

  • A Buyer's Guide to cloud security

    Given the amount of critical data being hosted in the cloud, it should come as no surprise that organizations are taking careful steps to safeguard their sensitive information. In this buyer’s guide, explore evaluation criteria and a competitive analysis designed to equip you with the knowledge to find the right cloud security provider for you.

    Download

  • Re-imagining cloud security in the multi-cloud era

    According to Verizon’s 2020 Data Breach Investigations Report, human error accounted for 22% of all breaches. So, as cloud capabilities expand into all areas of the business, how can organizations ensure adequate configuration to avoid human error? Download the following e-guide for insight and guidance regarding this persistent issue.

    Download

  • 9 essential elements of network security

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

    Download

  • 9 essential elements of network security

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

    Download

  • Enterprise data protection: Evaluating 6 leading vendors

    Incomplete or sub-par data protection practices can have devastating impacts for an organization – and choosing the right data protection partner is no easy task. To help you get started, download this enterprise data protection buyer’s guide to key evaluation criteria, questions to consider, a comparison of top vendors, and more.

    Download

  • Keeping up to Date with your Organization's Threat and Authentication Techniques

    Enterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.

    Download

  • 2020: The State of Endpoint Resilience Report: Explore key insights

    In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.

    Download

  • VMworld Europe Case Study: The National Trust

    A virtualisation project has allowed the National Trust to reduce its carbon emissions and to drastically cut its IT energy bill.

    Download

  • 5 steps to 5G security

    5G will radically improve mobile broadband services, enable connectivity to billions of global devices and create an IoT boom. So what’s holding up 5G deployment in real-world use cases? The answer is security – particularly in that 5G networks need to be tested and validated. Read this white paper to learn 5 steps to 5G security.

    Download

  • Cloud security: What to look for in a solution

    The cloud security market boasts an overwhelming array of features, vendors and offerings. To help break up the noise, this Cloud Security: Buyer’s Guide offers 15 points to keep top-of-mind while evaluating solutions and determining the best fit for your organization – read on to get started.

    Download

  • Eliminating ransomware attack downtime: Case study

    In this case study, La Sentinelle, a media group in Mauritius, sought to eliminate downtime associated with ransomware in the wake of a disruptive malware attack. Download this white paper to learn how they developed a program that would enable them to identify, mitigate, and prevent malware attacks.

    Download

  • SaaS ERP mushrooms during Covid crisis, up to a point

    In this e-guide we look at the migration of business applications to the cloud, under the discipline of the Covid crisis; we examine the question of who is winning the cloud ERP wars; and offer a case study of one large, complex company, Vodafone, that gives a counter example of how cloud still has limits when it comes to ERP.

    Download

  • Managing Web Security in an increasingly Challenging Threat Landscape

    In this expert guide, discover how new trends such as mobility, social networking, and cloud computing may be putting your organization at risk, and learn essential strategies for securing your extended enterprise from Web-based threats – read on to learn more.

    Download

  • Global Managed Security Services Providers, Q3 2020

    AT&T Cybersecurity is ranked among the top managed security service providers in The Forrester WAVE™: Global Managed Security Services Providers, Q3 2020. Download your complimentary report today to see what Forrester had to say.

    Download

  • Mobile device controls: MDM security features vs. mobile native security

    When it comes to implementing mobile device management (MDM), not all organizations are the same. Read on to learn how to choose the right approach to MDM for your organization.

    Download

  • Consumerisation and BYOD Purchasing Intentions Europe 2013

    This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.

    Download

  • Higher education is changing, thanks to Dropbox & cloud collaboration

    The need to work from anywhere has never been more prevalent, and the flexible working initiatives of the office—like cloud-based collaboration apps—are filtering through into university life. Download this eBook to see how Dropbox is helping students and educators collaborate, while simultaneously keeping their data secure.

    Download

  • Intelligent Data in the Real World

    This 51-page eBook compiles more than 20 real-world and cross-industry success stories of organizations that are using intelligent data strategies to achieve massive gains in performance, productivity, and cost savings.

    Download

  • Threat Management: Devising a new strategy to tackle today's cyberattacks

    This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.

    Download

  • ISM Essentials Guide – Threat Management

    In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.

    Download

  • CW APAC – October 2020: Trend Watch: Storage

    In this handbook, Computer Weekly takes a peek at future storage technologies, such as helium and DNA, and offers some valuable tips on how to keep cloud storage costs under control. Read the issue now.

    Download